Protected members of a base class are like ________, but they may be accessed by derived classes. a. constructor functions.b. static members.c. private members.d. public members e. none of these.

Answers

Answer 1

Answer:

C). private members

Explanation:

These are options

a. constructor functions

b. static members

c. private members

d. public members

Protected members can be regarded as member that accessibility of them from outside the class is zero, they can only get accessibility from derived classes, though this is not applicable to private class. It should be noted that Protected members of a base class are like private but they may be accessed by derived classes.


Related Questions

What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity

Answers

Answer:

Size

Explanation:

thats it thats the answer

Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter. Sample output with inputs 2014 777: Dog license: 77702014

Answers

Answer:

Written in Python:

def licenseNum(licenseYear, customID):

    output = 100000 * customID + licenseYear

    print("Dog license: "+str(output))

 

Explanation:

This line defines the function with parameters licenseYear and customID

def licenseNum(licenseYear, customID):

This calculates the output as stated in the question

    output = 100000 * customID + licenseYear

This displays the output

    print("Dog license: "+str(output))

To call the function, make use of: licenseNum(2014, 777)

Where 2014 and 777 can be replaced with other digits as required

Answer: C++

void DogLicense:: CreateLicenseNum(int customID)   {

 

  licenseNum = (100000* customID) + licenseYear;

 

  return;

}

Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't work as well for travelling employees in locations with unreliable or no internet access. What steps could remote users take to keep access to important folders on the road?

Answers

Explanation:

Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.

Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.

how do i install glastopf on a windows computer using python and MySQL?

Answers

Explanation:

Connecting to MySQL using Python

Before you can access MySQL databases using Python, you must install one (or more) of the following packages in a virtual environment:

mysqlclient: This package contains the MySQLdb module. It is written in C, and is one of the most commonly used Python packages for MySQL.

mysql-connector-python: This package contains the mysql.connector module. It is written entirely in Python.

PyMySQL: This package contains the pymysql module. It is written entirely in Python.

All three of these packages use Python's portable SQL database API. This means that if you switch from one module to another, you can reuse almost all of your existing code (the code sample below demonstrates how to do this).

Setting up the Python virtual environment and installing a MySQL package

To set up the Python virtual environment and install a MySQL package, follow these steps:

Log in to your account using SSH.

To create a virtual environment, type the following commands:

please complete the spelling please tell fast.​

Answers

Answer:

spacebar and number i think

Explanation:

Answer:

b)ans might be number.........

Using the constant, declare a 1D array to store 10 integers ii. Write a loop that fills the array with 10 random numbers g

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

#include <cstdlib>//defining header file

using namespace std;

int main()//defining main method

{

const int ax[10]={1,2,3,4,5,6,7,8,9,10};//defining a const array ax that store 10 numbers

int r_num[10];//defining an array r_num

int i;//defining integer variable

for(i=0;i<10;i++)//defining for loop to calculate and store random numbers in array

{

   r_num[i]=rand()%100; //use rand function to store value in array

}

cout<<"Elements of the array that stores 10 random numbers: "<<endl;//print message

for(i=0;i<10;i++)//defining for loop for print array value

{

   cout<<r_num[i]<<endl;//print array value

}

return 0;

}

Output:

Elements of the array that stores 10 random numbers:  

83

86

77

15

93

35

86

92

49

21

Explanation:

In the above-given program, two arrays "ax, and r_num" is declared that store value in it, in which the ax array use the const keyword and in the r_num it uses the loop and random function which can be defined as follows:

In the second array "r_num", two for loop is declared, in which the first loop uses the rand function to store value in the array, and in the second array, it prints the value of the array.

Write a nested loop that prints the following output.
1
1 2 1
1 2 4 2 1
1 2 4 8 4 2 1
1 2 4 8 16 8 4 2 1
1 2 4 8 16 32 16 8 4 2 1
1 2 4 8 16 32 64 32 16 8 4 2 1
1 2 4 8 16 32 64 128 64 32 16 8 4 2 1

Answers

Answer:

Written in Python:

rows = 8

for i in range(1,rows+1):

      for j in range(1,rows):

             print(" ")

      x = 1

      for j in range(1,i):

             print(str(x)+" ",end='')

             x = int(x*2)

      while x >= 1:

             print(str(x)+" ",end='')

             x = int(x/2)

Explanation:

For each row, the print out is divided into two parts.

1. Starts from 1 and ascends to a peak

2. Then descends from the peak to 1

This line initializes the number of rows to 0

rows = 8

This iterates from 1 to the number of rows

for i in range(1,rows+1):

This prints a blank at the end of sequence printed on each line

      for j in range(1,rows):

             print(" ")

This initializes each row element to 1

      x = 1

This iterates the number of item to print on each line depending on the row

      for j in range(1,i):

This prints the row element in ascending order to the peak

             print(str(x)+" ",end='')

This calculates the next element to be printed

             x = int(x*2)

This checks for valid row element to print in descending order to 1

      while x >= 1:

             print(str(x)+" ",end='')

             x = int(x/2)

i have been looking for like 20 mins now and cant find the answers to test 3 on edhesive. does anybody have an clue to where i can find it? it is a 20 question test.

Answers

Answer:

Try looking it up. If not, go with your gut!

Which word or phrase refers to an increasingly common method of computing and storing files?

A.
Virtual downloads

B.
Outsourcing

C.
Digital technologies

D.
Cloud computing

Answers

The answer is Cloud computing
Hope this helps-

Answer:

cloud computing

Explanation:

You are implementing a RAID storage system and have found a system with eight 100 GB drives. How much storage space will you have available? How does the OS handle this RAID?

Answers

Answer:

The space available will vary between 800 GB (100%) and 400 GB (50%) of the total disks, depending on the RAID level.

The OS will handle the RAID as a single disk.

Explanation:

Each RAID level implements parity and redundancy in a different way, so the amount of disks used for this extra information will reduce the space available for actual storage.

Usual RAID levels are:

RAID 0: does not implement any redundancy or parity, so you will have available 100% of the total storage: 8 x 100 GB = 800 GB

RAID 1: Duplicates all the information in one disk to a second disk. Space is reduced in half: 400 GB

RAID 5: Uses the equivalent of 1 disk of parity data distributed evenly on each disk, meaning the space available is [tex]\frac{n-1}{n}[/tex] of the total disks: [tex]\frac{7}{8}[/tex] of 800 GB = 700 GB

Writting and reading the information on a RAID storage is handled by a raid controller, either implemented in hardware or software. The OS will "see" a single disk and will read or write information as usual.

Guess The Lyrics:
She like the way that I ______
She Like The Way That I _____
She Like The Way That I ______
She Like The Way That I

Answers

she like the way that i *DANCE*
she like the way that i *MOVE*
she like the way that i *ROCK*
she like the way i *WOO*

song : DIOR pop smoke

Answer:

Explanation:

She like the way that I _Dance_____She Like The Way That I __Move___She Like The Way That I ___Rock___She Like The Way That I Woo

In a network that uses distance-vector routing protocols, what information is included in the update sent out by each router?

Answers

Answer:

Network or next hop associations

Explanation:

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is "network or next hop associations."

This information is contained in a routing table. It commands a router on which destination is most favorable. It is done by carrying the packet to a certain router that indicates the next hop along the way to the last destination.

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is the network or next hop association.

A distance-vector routing protocol in data networks is vital for determining the best route for the packets that are based on the distance.

It should be noted that distance-vector routing protocol simply measures the distance based on the number of routers that a packet will have to pass. The information that is vital will be the network or next hop association.

Read related link on:

https://brainly.com/question/20595433

The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration you notice a recently implemented rule but can't locate manager approval for it. What would be a good step to have in the procedures for a situation like this

Answers

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

When you pass an array name as an argument to the function what is actually being passed

Answers

Answer:

The Base address of the array is being passed

why am I doing the investigation?​

Answers

Answer:

What do you mean

Explanation:

Answer:

Because you like to

Explanation:


When do you use online reading tools? Check all that apply.
when there is a word that I do not know how to pronounce
when the text is in a language that I do not fully understand
o when I need to know the meaning of a word
O O O O
O when there are main ideas or details I want to take notes on
when there is information in my reading that I want to look up quickly

Answers

Answer:

the answers are all of them

Answer:

A, B, C, D, E, F

Explanation:

It's any of them. There is no wrong answer.

Got right, on warm up! Hope this helps.

What is the median of 6, 16, 9, 20, 45, 30, and 32?
A. 9
B. 16
C. 20
D. 22

Answers

I believe the answer to your question is going to be C. 20
Hope this helps:)

What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB.B) 64 KB.C) 39 KB.D) None of the above.

Answers

Answer:

B

Explanation:

64kb

write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product name ascending

Answers

Answer:

SELECT product_name, amount_due, amount_paid,

              cancelled, amount_refunded

   FROM products

ORDER BY product_name ASC;

Explanation:

SQL (Structured Query Language ) was used above.

The SELECT command is used to list all the variables we want in our output.

The FROM command signifies the location.

ORDER BY command ensures that your result is ordered

ASC means Ascending Order.

; signifies the end of the query.

NOTE: Underscores were used because variables cannot be written with spaces between them

Three of the following values could be stored as strings. When would you NOT use a string command? O To store a word. O To store values NOT used for calculations. O To store decimal values. O To store a list of colors.​

Answers

Answer:

To store decimal values

Explanation:

Decimal values are considered a float data type, not a string, so if the question is asking for the only thing that couldn't be stored as a string, it would be a decimal value.

Decimals can be stored as a string in certain situations, but it would have no value in a mathematical equation.

Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual which of the following is a possible solution to counteract this one and install any recently added Southward and review to ensure that the recycle bin is empty clear Internet history and cookies and remove any unused files for the desktop three defrag the hard drive or four change the computer power settings to minimal

Answers

Answer:

Clear out unused files

Explanation:

The reason whay the hard drive is so slow is probably because it full of junk. The recycle bin, old update files, cached data, etc. can easily fill up the hard drive, thus slowing it down.

ATTENTION MODERATORS

User "69PierNeedsAnswers69" has been spamming the same message on multiple questions, likely point farming. I request that you time him out as soon as possible.

Link to his profile: https://brainly.com/app/profile/27562423

Answers

Answer: lol

Explanation:

how many earths fit in a sun

Answers

My Answer:

1.3 million Earths.

The answer is that it would take 1.3 million Earths to fill up the Sun. It would take so much Earths to fill the Sun because the Sun makes up 99.86% of the mass of the Solar System, so a lot of Earths would be needed to fill up the Sun.

- Elianie ✨

here's a better picture of my pc mouse and keyboard​

Answers

Answer:ok

Explanation:

Answer:

what r ue grades

Explanation:

What is the importance of internet safety?

Answers

Answer:

1. Identity theft

2. Safety for you and your family and personal info

3. Harrasement and bullying prevention

Some things never to share on the internet with strangers...

1. Full name

2. Birthday

3. State or city of home

4. Pictures of yourself

5. Personal info about you or your family members

6. Personal social media links and tags

Explanation:

hOPE THIS HELPS!! I think some people need a reminder of this sometimes! you didnt give any options so i hope this helps you!

Match the data types to the types of value they are: Currency, Text, Date/time, and Name.
$500-
10th January 2015-
56,654.09-
Sample.1234-

Answers

$500- Currency
10th January 2015- Date/time
56,654.09- Number
Sample.1234- Text

Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
on the File tab to set a password for the workbook.
Encrypt with Password
Save with Password
Open with Password
Set Password
NEXT QUESTION
ASK FOR HELP
TURN IT IN

Answers

Answer:

Encrypt with password

please choose odd one out please tell fast​

Answers

Answer: arrow key

Explanation:

Stacy is generating a report for her database. Which of these statements is true about her database reports?
OA. To generate a report will include all her records in her database
OB. The generator report will include all records that a query fetches
OC. Once you generate a report she cannot edit it
OD. A report in itself another database on which she can run queries

Answers

The answer is OB. The generated report will include all records that a query fetches.

Deb needs to add borders on the cells and around the table she has inserted into her Word document.




Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group

Answers

Answer:

Design tab

Explanation:

Select the call or table that you will like to useThen select the design tabIn the group page background select Page Borders There you will have multiple choses for where you want your borderYou can even customize your border by pressing Custom Border at the bottom of the list for Page Borders

Answer:

Table tools design contextual tab

Explanation:

Other Questions
Sarah competes in a long jump competition.Her first jump is 4.25 m.Her best jump is 12% more than this.However, her best jump is 15% lower than the winning jump.Work out the length of the winning jump. HELP PLEASE!!Which of these statements concerning political candidates is true?5 pointsA) during thepast 100 years, there has been little change in the importance of either acandidate's image or qualificationsB) the importance of a candidate's image has decreased due to greater candidateexposure in the mediaC) due to the large amount of information on the internet, a candidate's qualificationshave become more important, while the importance of images has decreasedD) due to the media, the importance of a candidate's image has increased in recent years what's a good app for ios 14 to customize your apps? Tara purchased a machine for $40,000 to be used in her business. The cost recovery allowed and allowable for the three years the machine was used are as follows: Cost Recovery Allowed Cost Recovery AllowableYear 1 $16,000 $ 8,000Year 2 9,600 12,800Year 3 5,760 7,680If Tara sells the machine after three years for $15,000, how much gain should she recognize? Which of the following represents an exponential function?(1) y = 3x - 7(3) y = 3(7)"(2) y=7x(4) y = 3x +7 Domain of the image above find it plz What are the four steps of the discounting process? Could the proceeds of the note be less than the face value of the note? A rapid decline in hCG levels may indicate which of the following cases? Predict: Based on your hypothesis, predict how changing the rabbit population will affect the other organisms at first. Write Increase or Decrease next to each Prediction in the table. can someone help me really fast :/ Please help ASAP Due in 1:00 P.M!!! Marking Brainliest!!! 2. In the real-world, humans hear sound as an analog signal. This means the signal is a continuouswaveform, which is completely processable by human ears. However, machines 'hear' sound a littledifferently, as they process sound digitally, which is a discrete waveform.When sound is recorded or transmitted electronically, the continuous (analog) waveform is sampled toconvert it to a discrete (digital) sequence. Sampling is the process of reducing a continuous-time signalto a discrete-time signal. As the sampling rate increases, the sound quality of the recording ortransmission will improve.The graphs below represent two different samples of a pure tone. Sample 1 is taken 8 times per unit oftime. Sample 2 is taken 16 times per unit of time.a) why would sample 2 reproduce a better replication of the pure signal?b) write a sinusoid model for sample 2. Please its due today at 6:00pm please help me will mark the brainiest and more points please help me THIS 50 POINTS ANSWER FAST. Graph two lines whose solution is (1,4) give me the 2 of the equations. For the graphs go to Desmos. Answer fast. Nine of the Twenty-five girls on Albert Einstein Middle School's soccer team are sixth-grade students. Find the percentage of sixth graders on the team. Show two different ways of solving for the answer. 3)As blood sugar levels rise in the body, insulin is released by the pancreas to lower the levels,This process allows your body to maintain normal blood sugar levels and is called:AhomeostasisB)cell membraneC)glycogenD)glucose 4/5 of Peter's money is twice as much as Weimin's money. What fraction of Peter's money is Weinim's money? This equation represents the data:2.5(12.75x + 24.50) = 188.75Big Time Movers worked hours on New Years Day. I really need help with finding the missing lengths of x and y. 1/5 multiplied by what number will result in a product of 1/10